This document discusses heart rate zones for exercise and fitness. It notes that there are 5 heart rate zones defined relative to an individual's maximum heart rate, with zone 1 being the lowest intensity and zone 5 being the highest intensity. Staying within different heart rate zones can help target different fitness goals, with lower zones focusing more on recovery and higher zones on performance and endurance training. A data source is provided for an online heart rate calculator.
The document discusses Ivan's experience and qualifications in SEO and WordPress, including 18 years of experience, building 50 sites for testing, handling over 400 WordPress projects, and leading various meetup groups. It also provides information on becoming a client for Ivan's consulting and training services. The document serves as an introduction and overview of Ivan's background and available services.
This document discusses various types of AI, including text-to-text, text-to-image, text-to-speech, and text-to-video. It provides biographical information about Ivan So and his experience in SEO, WordPress, and organizing events. The document also lists client services such as consulting and training. It includes sections on what AI is and examples of different AI applications. Generative AI and parameters in AI are explained. Popular AI models like GPT-3 and techniques like GANs are mentioned.
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Ralph Szeto, Chairman, Hong Kong Association of Interactive Marketing
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Saron Leung, Industry Head of Financial Services, Google Hong Kong
Inspire@eLC Chapter 3 - HKTVMall: Leading Technology Evolution for eCommerce Industry by Ms. Jelly Zhou, Executive Director and Chief Executive Officer (Hong Kong) of Hong Kong Technology Venture Company Limited
This document discusses heart rate zones for exercise and fitness. It notes that there are 5 heart rate zones defined relative to an individual's maximum heart rate, with zone 1 being the lowest intensity and zone 5 being the highest intensity. Staying within different heart rate zones can help target different fitness goals, with lower zones focusing more on recovery and higher zones on performance and endurance training. A data source is provided for an online heart rate calculator.
The document discusses Ivan's experience and qualifications in SEO and WordPress, including 18 years of experience, building 50 sites for testing, handling over 400 WordPress projects, and leading various meetup groups. It also provides information on becoming a client for Ivan's consulting and training services. The document serves as an introduction and overview of Ivan's background and available services.
This document discusses various types of AI, including text-to-text, text-to-image, text-to-speech, and text-to-video. It provides biographical information about Ivan So and his experience in SEO, WordPress, and organizing events. The document also lists client services such as consulting and training. It includes sections on what AI is and examples of different AI applications. Generative AI and parameters in AI are explained. Popular AI models like GPT-3 and techniques like GANs are mentioned.
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Ralph Szeto, Chairman, Hong Kong Association of Interactive Marketing
Inspire@eLC Chapter 4 - How Data Analytics Transforming Digital Marketing on 7 October 2022 by Mr. Saron Leung, Industry Head of Financial Services, Google Hong Kong
Inspire@eLC Chapter 3 - HKTVMall: Leading Technology Evolution for eCommerce Industry by Ms. Jelly Zhou, Executive Director and Chief Executive Officer (Hong Kong) of Hong Kong Technology Venture Company Limited
Digital Oasis is a Hong Kong-based technology company that specializes in innovative electronic products using patented material sound and conduction technologies. They design and manufacture thin, light audio devices that can play sound through materials like metal and can be painted with customizable designs. Their products include smart home speakers and sound wall panels for home theaters that combine audio and decorative art.
This document discusses the interaction between cyber security and school IT policy. It outlines various IT systems, applications, and devices used in schools, such as servers, networks, cloud services, and devices. It stresses the importance of having proper IT policies to govern operation, systems and applications, control, security, and management. The document provides examples of key policies including acceptable use, network, data protection, backup, email, and disaster recovery policies. It also discusses guidelines and rules around issues like passwords, verification, training, manuals, and applications. Finally, it provides tips for effective policy making like understanding needs, problems, requirements, training users, and ongoing evaluation.
This document summarizes the results of a vulnerability assessment performed on the networks of 6 schools by HKT. It found that around 25% of systems had web services, with an average risk score of 54 and scores ranging from 20 to 78. Manual review found that 33% of vulnerabilities were high or critical risks. Common high risk issues included SQL injection, cross-site scripting, and outdated software with known vulnerabilities. The document discusses ongoing challenges in security management like complexity, recruitment, and funding. It proposes a security-centric approach with centralized monitoring, automation, and remote support provided by a managed security service partner.
This document summarizes a presentation about assessing and managing school network security. It discusses the results of vulnerability assessments conducted on 50 school websites, which found over 110 critical vulnerabilities. The top issues were SQL injection, cross-site scripting, and outdated components. Managing security is challenging due to increasing systems, data, and user touchpoints. Trends include taking a security-centric approach across the network and adopting comprehensive managed security services. Key aspects of security management are people, technology, process and having a security operations center for monitoring, alerting and incident response.
This document summarizes cybersecurity trends and tips for 2020. It discusses the top passwords used, guidelines for strong passwords, and major cybersecurity incidents in 2019 such as data breaches affecting over 500 million records. It also provides tips on protecting against phishing attacks, risks of IoT devices, and ransomware. Emerging issues like deepfakes and security risks after technologies reach end of support are mentioned. The key message is that information security requires efforts from all stakeholders.
The document discusses security challenges and prevention measures for schools. It summarizes findings from a UK cyber security audit of 432 schools, which found that 83% experienced cyber incidents. While most schools had antivirus and firewalls, only 45% included IT services in risk assessments. The document also outlines common attacks schools face like phishing, ransomware, and data breaches. It provides prevention tips and emphasizes the importance of a holistic security approach involving people, processes, and technology.
The document summarizes the findings of a penetration test project conducted on the websites and applications of over 30 schools. It identifies over 240 critical vulnerabilities across the schools, including exposed personal data, outdated software with known vulnerabilities, and SQL injection issues. Recommendations include encouraging software vendors to provide ongoing patches, implementing regular vulnerability scanning, and ensuring systems and software are regularly updated to the latest versions. Best practices for schools outlined in the document include implementing firewalls, regular backups, web application firewalls, and security awareness training for practitioners.
As an independent security consultant, the author conducted penetration tests of ten K-12 school websites over 99 hours. They found over 1,700 vulnerabilities total, including 170 critical issues exposing over 20,000 student records. Common vulnerabilities included SQL injection, outdated systems, and unencrypted passwords. The author provided demonstrations of their scanning tools and process and recommendations to schools like regular scanning, patching systems, and relying less on vulnerable third-party vendor solutions.
This document outlines security incident handling for schools. It discusses common security incidents that impact schools like ransomware, hacking extortion, DDoS attacks, and information leakage. It then describes the incident handling life cycle which includes preparation, detection and analysis, containment and recovery, and post incident activities. Some challenges of security incident handling are also discussed like user awareness, system vulnerabilities, new technologies, and lack of security resources. The presentation emphasizes that schools need to establish security incident handling capabilities and follow the incident response life cycle in order to minimize risks from security incidents.
The document summarizes updates made to the Education Bureau's "Information Security in Schools – Recommended Practice" guidelines. Major updates include new chapters on mobile device security, malware protection, and website/web application security. Network security recommendations were also revised with new guidance on wireless network deployment, email security, and separating wired and wireless networks. The document provides an overview of IT security grants and support available to schools from the Education Bureau.
This document summarizes the IT infrastructure and security measures at TWGHs Ko Ho Ning Memorial Primary School. It outlines their virtual desktop environment consisting of 410 virtual machines hosted on 3 servers with 10Gbps backbone. It then describes the base arrangements of the virtual machines in different groups and sectors. Finally, it details the security protections in place including antivirus software, firewalls, access controls, monitoring of student online activity and management of applications and internet access.
The document summarizes a school penetration testing project conducted by UDomain. They identified over 1,700 vulnerabilities across 10 school websites, including 20,000+ records of personal data. Critical vulnerabilities included SQL injection, XSS, and passwords in plaintext. Recommendations included more regular scanning, patching of outdated systems, and reliance on secure vendor solutions. UDomain demonstrated SQL injection techniques and explained their security services and qualifications.
The document discusses cybersecurity and different types of cyber attacks. It provides information on vulnerability testing and web application attacks observed between certain dates for all verticals and education. It defines white hat hackers and discusses the role of ethical hacking and the Chief Information Security Officer (CISO). It introduces five basic security principles organizations should follow, including maintaining strong access controls, providing security awareness training, implementing patch management, ensuring strong system configuration, and conducting penetration testing.
Digital Oasis is a Hong Kong-based technology company that specializes in innovative electronic products using patented material sound and conduction technologies. They design and manufacture thin, light audio devices that can play sound through materials like metal and can be painted with customizable designs. Their products include smart home speakers and sound wall panels for home theaters that combine audio and decorative art.
This document discusses the interaction between cyber security and school IT policy. It outlines various IT systems, applications, and devices used in schools, such as servers, networks, cloud services, and devices. It stresses the importance of having proper IT policies to govern operation, systems and applications, control, security, and management. The document provides examples of key policies including acceptable use, network, data protection, backup, email, and disaster recovery policies. It also discusses guidelines and rules around issues like passwords, verification, training, manuals, and applications. Finally, it provides tips for effective policy making like understanding needs, problems, requirements, training users, and ongoing evaluation.
This document summarizes the results of a vulnerability assessment performed on the networks of 6 schools by HKT. It found that around 25% of systems had web services, with an average risk score of 54 and scores ranging from 20 to 78. Manual review found that 33% of vulnerabilities were high or critical risks. Common high risk issues included SQL injection, cross-site scripting, and outdated software with known vulnerabilities. The document discusses ongoing challenges in security management like complexity, recruitment, and funding. It proposes a security-centric approach with centralized monitoring, automation, and remote support provided by a managed security service partner.
This document summarizes a presentation about assessing and managing school network security. It discusses the results of vulnerability assessments conducted on 50 school websites, which found over 110 critical vulnerabilities. The top issues were SQL injection, cross-site scripting, and outdated components. Managing security is challenging due to increasing systems, data, and user touchpoints. Trends include taking a security-centric approach across the network and adopting comprehensive managed security services. Key aspects of security management are people, technology, process and having a security operations center for monitoring, alerting and incident response.
This document summarizes cybersecurity trends and tips for 2020. It discusses the top passwords used, guidelines for strong passwords, and major cybersecurity incidents in 2019 such as data breaches affecting over 500 million records. It also provides tips on protecting against phishing attacks, risks of IoT devices, and ransomware. Emerging issues like deepfakes and security risks after technologies reach end of support are mentioned. The key message is that information security requires efforts from all stakeholders.
The document discusses security challenges and prevention measures for schools. It summarizes findings from a UK cyber security audit of 432 schools, which found that 83% experienced cyber incidents. While most schools had antivirus and firewalls, only 45% included IT services in risk assessments. The document also outlines common attacks schools face like phishing, ransomware, and data breaches. It provides prevention tips and emphasizes the importance of a holistic security approach involving people, processes, and technology.
The document summarizes the findings of a penetration test project conducted on the websites and applications of over 30 schools. It identifies over 240 critical vulnerabilities across the schools, including exposed personal data, outdated software with known vulnerabilities, and SQL injection issues. Recommendations include encouraging software vendors to provide ongoing patches, implementing regular vulnerability scanning, and ensuring systems and software are regularly updated to the latest versions. Best practices for schools outlined in the document include implementing firewalls, regular backups, web application firewalls, and security awareness training for practitioners.
As an independent security consultant, the author conducted penetration tests of ten K-12 school websites over 99 hours. They found over 1,700 vulnerabilities total, including 170 critical issues exposing over 20,000 student records. Common vulnerabilities included SQL injection, outdated systems, and unencrypted passwords. The author provided demonstrations of their scanning tools and process and recommendations to schools like regular scanning, patching systems, and relying less on vulnerable third-party vendor solutions.
This document outlines security incident handling for schools. It discusses common security incidents that impact schools like ransomware, hacking extortion, DDoS attacks, and information leakage. It then describes the incident handling life cycle which includes preparation, detection and analysis, containment and recovery, and post incident activities. Some challenges of security incident handling are also discussed like user awareness, system vulnerabilities, new technologies, and lack of security resources. The presentation emphasizes that schools need to establish security incident handling capabilities and follow the incident response life cycle in order to minimize risks from security incidents.
The document summarizes updates made to the Education Bureau's "Information Security in Schools – Recommended Practice" guidelines. Major updates include new chapters on mobile device security, malware protection, and website/web application security. Network security recommendations were also revised with new guidance on wireless network deployment, email security, and separating wired and wireless networks. The document provides an overview of IT security grants and support available to schools from the Education Bureau.
This document summarizes the IT infrastructure and security measures at TWGHs Ko Ho Ning Memorial Primary School. It outlines their virtual desktop environment consisting of 410 virtual machines hosted on 3 servers with 10Gbps backbone. It then describes the base arrangements of the virtual machines in different groups and sectors. Finally, it details the security protections in place including antivirus software, firewalls, access controls, monitoring of student online activity and management of applications and internet access.
The document summarizes a school penetration testing project conducted by UDomain. They identified over 1,700 vulnerabilities across 10 school websites, including 20,000+ records of personal data. Critical vulnerabilities included SQL injection, XSS, and passwords in plaintext. Recommendations included more regular scanning, patching of outdated systems, and reliance on secure vendor solutions. UDomain demonstrated SQL injection techniques and explained their security services and qualifications.
The document discusses cybersecurity and different types of cyber attacks. It provides information on vulnerability testing and web application attacks observed between certain dates for all verticals and education. It defines white hat hackers and discusses the role of ethical hacking and the Chief Information Security Officer (CISO). It introduces five basic security principles organizations should follow, including maintaining strong access controls, providing security awareness training, implementing patch management, ensuring strong system configuration, and conducting penetration testing.